The “Consumerization of IT” trend is here to stay. However, it’s created a free-for-all attitude among corporate IT users seeking new ways to improve productivity. Combined with BYOD, the risks have grown exponentially from  unauthorized software invading your network. Some of these solutions may be good, but should get vetted and be placed on an approved vendor list.

Here’s one way you can gain visibility and lock down shadow IT:

Article link
“Using the open DMARC standard, companies can specify a list of servers that are authorized to send email on behalf of the company. Servers that attempt to use the company’s domain name but aren’t on the authorized list will find that their email is flagged.”